Search This Blog

Wednesday, December 11, 2013

The biggest Internet security challenges of 2013

Last Patch Tuesday of 2013 fixes 5 critical remote code execution flaws | Data-stealing malware pretends to be Microsoft IIS server module

Network World Security

Forward this to a Friend >>>


The biggest Internet security challenges of 2013
From the attack on privacy and Cryptolocker to Eric Snowden and the NSA, it's been a challenging year Read More


RESOURCE COMPLIMENTS OF: ForeScout

Frost & Sullivan Report:Continuous Compliance & Next Gen NAC
Find out how companies with hundreds to thousands of devices and distributed networks are managing security risks, enabling BYOD adoption, and supporting IT-GRC framework specifications. Download the Frost & Sullivan: Continuous Compliance and Next Generation NAC report.

WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

Last Patch Tuesday of 2013 fixes 5 critical remote code execution flaws
It's the last Patch Tuesday for 2013, hooray! Be prepared for multiple reboots; there are 11 patches, five of which are critical to fix remote code execution (RCE) holes. Read More

Data-stealing malware pretends to be Microsoft IIS server module
Trustwave's SpiderLabs researchers have found a piece of malware that collects data entered into Web-based forms, pretending to be a module for Microsoft's Internet Information Services (IIS) web-hosting software. Read More

Symantec walks away from managed firewall and endpoint services
Symantec has downsized their Managed Security Services portfolio, ending support for the managed firewall and managed endpoint offerings. Symantec says the change is part of an effort to streamline things within the company's Information Security portfolio, but what does that mean for existing managed security customers? Read More


WHITE PAPER: IBM

Proactively Manage Business Applications and User Experience
The comprehensive, integrated IBM portfolio of application performance management solutions enables IT to move beyond basic resource monitoring to optimize infrastructure performance and availability through the use of best practices for identifying and resolving infrastructure problems. Read Now

The worst IT project disasters of 2013
Trends come and go in the technology industry but some things, such as IT system failures, bloom eternal. Read More

Holiday security risks are in the real world too, not just online
The ubiquitous warnings about online shopping risks are well founded. As numerous experts are reminding consumers and businesses, the high season for shopping is also the high season for cybercrime. Read More

Fatal distraction: 7 IT mistakes that will get you fired
It's hard to get a good job in IT these days, but it's all too easy to lose one. Read More


WHITE PAPER: HP and Intel® Xeon® processors

Top Reasons to Choose HP BladeSystem
With continuously changing business requirements and technology playing a strategic role in day-to-day business, your organization needs a server infrastructure that enables you to take advantage of new opportunities while containing cost and complexity. Learn More

Tech titans urge surveillance reform
An industry consortium featuring some of the biggest names in technology – including Google, Microsoft, Facebook and Reddit – is urging the Obama Administration to support a major overhaul of laws governing electronic surveillance. Read More

A clear-eyed guide to Android's actual security risks
If you're an Android user -- or want to be -- you've likely heard about all the security risks of Google's mobile operating system. But how real are these threats, and how much damage can they do? Despite the fears, are Android devices actually a safe bet for an enterprise mobility strategy? Read More

Other browser makers follow Google's lead, revoke rogue certificates
Microsoft, Mozilla and Opera Software today joined Google in revoking rogue digital certificates that had been issued by a subordinate certificate authority (CA) of France's cybersecurity agency. Read More


SLIDESHOWS

8 tricks to optimize Windows 8.1

Here are eight things we recommend doing to make Windows 8.1 more efficient.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 10 Linux distros to watch in 2014

2. UPDATE: Microsoft backtracks on when it will stop selling Windows 7

3. Ubuntu 13.10: The good, the bad and the ugly

4. 10 ex-Cisco employees making an impact in the industry

5. Cloud pricing: It's (really) complicated

6. 8 Ethernet predictions for 2014

7. Not even Microsoft could kill the ZeroAccess botnet

8. Microsoft's most monumental hits, misses, and moments of 2013

9. iPhone 6 rumor rollup for the week ending Dec. 6

10. Review: LG's G2 is great for geeks


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: